The clean desk test
Ten ways a messy desk puts confidential information at risk.
Joan Goodchild | 23 Jan | Read more
Ten ways a messy desk puts confidential information at risk.
Joan Goodchild | 23 Jan | Read more
All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at Everbridge, fills us in on the essentials for these plans.
Joan Goodchild | 08 Feb | Read more
Timothy Youngblood, CISSP, has joined Kimberly Clark as their Chief Information Security Officer. Kimberly Clark is multi-national brand conglomerate with staple consumer products such as Kleenex, Pull-ups, and Scotts Towels.
Joan Goodchild | 17 Apr | Read more
In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted by the university.
Joan Goodchild | 22 Jan | Read more
George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data
Joan Goodchild | 15 Jul | Read more
Still got an old Blackberry or Compaq laying around? CSO Publisher (and packrat) Bob Bragdon does! Rummaging around Bragdon's attic (with some memory help from mobile office expert Catherine Roseberry) provides a look at how mobile device security has evolved.
Joan Goodchild | 09 Jul | Read more
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.
Joan Goodchild | 21 Jun | Read more
For the past several months, security veteran Aaron Turner has been making the rounds at industry events presenting some pretty disturbing information about the state of mobile security.
Joan Goodchild | 20 May | Read more
Each year, the Executive Women's Forum announces their "Women of Influence" Awards at their annual EWF event.
Joan Goodchild | 06 May | Read more
Social engineering techniques are frequently part of an overall security penetration test; often used as a way to test an organization's so-called "human network."
Joan Goodchild | 23 Apr | Read more
If you're running a robust security program, you're regularly conducting security and vulnerability assessments of your both your network and physical environments. But in the quest to uncover security gaps and vulnerabilities, slip-ups are often made, too, that make these efforts less effective at having a positive impact.
Joan Goodchild | 08 Apr | Read more
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Joan Goodchild | 19 Mar | Read more
Bill Murphy, CTO and managing director at Blackstone, a global investment and advisory firm, knew he wanted to find a way to allow employees to use their own devices for work. The demand was there, and he was increasingly hearing about how adding in BYOD would help productivity.
Joan Goodchild | 04 Mar | Read more
Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was responsible for overseeing annual audits of the state's systems.
Joan Goodchild | 21 Feb | Read more
This workspace contains 10 security mistakes. Can you spot the errors that put confidential information at risk?
Joan Goodchild | 21 Jan | Read more